Главная
Study mode:
on
1
Intro
2
Agenda
3
Some of the commonly used frameworks
4
Relevance
5
Building blocks
6
Process
7
Sample Use Case
8
Requirement Gathering and Onboarding
9
Balancing the Risk
10
The missing piece
11
Threat Surfing Architecture
12
Onboarding new application
13
Baselining the threat landscape
14
Benefits
15
Key Takeaways
Description:
Explore OWASP-based threat modeling and learn how to create a feedback model in an agile environment in this 44-minute conference talk. Dive into commonly used frameworks, their relevance, and essential building blocks. Understand the process through a sample use case, covering requirement gathering, onboarding, and risk balancing. Discover the concept of threat surfing architecture and its application in onboarding new applications and baselining the threat landscape. Gain insights into the benefits and key takeaways of implementing this approach to enhance your organization's security posture.

OWASP Based Threat Modelling - Creating A Feedback Model in an Agile Environment

OWASP Foundation
Add to list
0:00 / 0:00